According to new research, exploit kit creators have been targeting some of the oldest and most common software flaws — even as the cyberthreat landscape shifts to more sophisticated attack vectors.
Endpoint detection and antiphishing tools can help users filter basic spam email, but detecting malspam in PDF and Microsoft Office documents requires a more thorough investigation.
The traditional Windows device management solutions that IT admins have used for years are evolving into unified endpoint management solutions to fit the needs of today's security landscape.
A new security intelligence report revealed that attackers are combining botnets, ransomware and phishing campaigns to create a triple threat that's hard to defeat and even harder to dislodge.
Fraudsters have used the MS Office Equation Editor cybersecurity vulnerability to craft an attack on financial institutions and users.
When integrated with a UEM solution by default, Windows Information Protection (WIP) acts as its own container and maintains a native user experience.
A Colombian security researcher discovered a flaw that could enable attackers to steal Windows NTLM password hashes without any user interaction.
The cybercriminals behind Locky ransomware have adopted a new DDE hijacking technique to infect as many victims as possible while evading detection.
Researchers uncovered two security vulnerabilities in Microsoft Windows that could put businesses at risk of credential forwarding and password cracking.
It appears that the current Petya payload is being distributed using the same exploits that were part of the leaks that powered the spread of WannaCry.